Metasploit Modules

MS14-068 Microsoft Kerberos Checksum Validation Vulnerability

This module exploits a vulnerability in the Microsoft Kerberos implementation. The problem
exists in the verification of the Privilege Attribute Certificate (PAC) from a Kerberos TGS
request, where a domain user may forge a PAC with arbitrary privileges, including
Domain Administrator. This module requests a TGT ticket with a forged PAC and exports it to
a MIT Kerberos Credential Cache file. It can be loaded on Windows systems with the Mimikatz
help. It has been tested successfully on Windows 2008.

Github Repositories

as-rep-roast
Author
Jason Martinsen
Python code to execute an AS-REP Roasting attack
USE ONLY AGAINST AUTHORIZED TARGETS
Usage :
USAGE:
as-rep-roastpy -u &lt;userName&gt;@&lt;domainName&gt; -d &lt;domainControlerAddr&gt;
Hashcat compatible output will be piped to screen and to hashcatout file
This code is based on the code from the below project

License
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
Version 3, August 2017
Everyone is permitted to copy and distribute verbatim or modified
copies of this license document, and changing it is allowed as long
as the name is changed
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
You just DO WHAT THE FUCK YOU WANT TO